Authentication

Authentication is the process of verifying the identity of a user or client.

There are three main types of authentication:

  • Something you know, such as a password or the answer to a security question. These are sometimes called "knowledge factors".

  • Something you have, This is a physical object such as a mobile phone or security token. These are sometimes called "possession factors".

  • Something you are or do. For example, your biometrics or patterns of behaviour. These are sometimes called "inherence factors".

Authentication is the process of verifying that a user is who they claim to be. Authorization involves verifying whether a user is allowed to do something.

Most vulnerabilities in authentication mechanisms occur in one of two ways:

  • The authentication mechanisms are weak because they fail to adequately protect against brute-force attacks.

  • Logic flaws or poor coding in the implementation allow the authentication mechanisms to be bypassed entirely by an attacker. This is sometimes called "broken authentication".

The impact of authentication vulnerabilities can be severe. If an attacker bypasses authentication or brute-forces their way into another user account, they have access to all the data and functionality that the compromised account has.

Last updated